M. Bellare, O. Goldreich, and A. Mityagin, The Power of Verification Queries in Message Authentication and Authenticated Encryption, Cryptology ePrint Archive, vol.309, 2004.

J. Carter and M. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, issue.2, pp.143-154, 1979.
DOI : 10.1016/0022-0000(79)90044-8

URL : http://doi.org/10.1016/0022-0000(79)90044-8

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2 Document 1: UEA2 and UIA2 Specification. Version 2.1, 16th, Tech. rep., ETSI, 2009.

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1, p.ETSI, 2010.

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, p.ETSI, 2010.

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, p.ETSI, 2010.

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1.5, 4th, Tech. rep., ETSI, 2011.

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC Specification. Version 1.5, 4th, Tech. rep., ETSI, 2011.

E. Sage, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 4: Design and Evaluation Report. Version 1.3, 18th, Tech. rep., ETSI, 2011.

H. Handschuh and B. Preneel, Key Recovery Attacks on Universal Hash Function Based MAC Algorithms Advances in Cryptology -CRYPTO, pp.144-161, 2008.

H. Krawczyk, LFSR-based Hashing and Authentication Advances in Cryptology -CRYPTO' 94, pp.129-139, 1994.

M. Albrecht, K. P. Watson, and G. , Plaintext Recovery Attacks against SSH, 2009 30th IEEE Symposium on Security and Privacy, pp.16-26, 2009.
DOI : 10.1109/SP.2009.5

P. Rogaway, Bucket Hashing and its Application to Fast Message Authentication Advances in Cryptology -CRYPTO' 95, pp.29-42, 1995.

P. Rogaway, Bucket Hashing and Its Application to Fast Message Authentication, Journal of Cryptology, vol.12, issue.2, pp.91-115, 1999.
DOI : 10.1007/PL00003822

V. Shoup, On Fast and Provably Secure Message Authentication Based on Universal Hashing, Advances in Cryptology -CRYPTO' 96, pp.313-328, 1996.
DOI : 10.1007/3-540-68697-5_24

D. Stinson, Universal hashing and authentication codes, Designs, Codes and Cryptography, vol.22, issue.3, pp.369-380, 1994.
DOI : 10.1007/BF01388651

B. Sun, X. Tang, and C. Li, Preliminary Cryptanalysis Results of ZUC. Presented at the First International Workshop on ZUC Algorithm, 2010.

M. Wegman and J. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981.
DOI : 10.1016/0022-0000(81)90033-7

H. Wu, Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3